E N D
“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers, instead of treading lightly, just kept abusing more accounts and taking over more systems, making it only a matter of time before their intrusions were discovered. The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.” • Rik Farlow, USENIX ;login:, August 2004
Who Am I ? Tom Bettge Associate Director Scientific Computing Division National Center for Atmospheric Research Boulder, Colorado Background: Applications Software Engineer – Climate Modeling my mother’s maiden name is Hacker
“………………………….The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.” • Rik Farlow, USENIX ;login:, August 2004
Program Committee • Tom Bettge National Center for Atmospheric Research • RuthAnne Bevier California Institute of Technology • Ginger Caldwell National Center for Atmospheric Research • Walter Dykas Oak Ridge National Laboratory • Victor Hazlewood San Diego Supercomputer Center • Chris Hempel Texas Advanced Computer Center • Jim Marsteller Pittsburgh Supercomputer Center • Marla Meehl National Center for Atmospheric Research • George Strawn National Science Foundation • Howard Walter National Energy Research Scientific Computing Center • John Towns National Center for Supercomputing Applications
Who Are You ? • Registered Participants: 128 • By Organizational/Agency: • University/NSF 79 • DOE 25 • Military 8 • NASA 8 • NOAA 3 • Other 5 • By Duty/Position: • system/security administration 50 • management 40 • end user 10
Breakout Sessions • User Policies/Education • System Administration Policies/Education • Network Based Intrusion Detection • Host Based Intrusion Detection • Grid Computing Challenges
Cybersecurity Summit 2004 Tom Bettge NCAR/Scientific Computing Division 1 Breakout Session Assignment
Monday Evening: Meeting Rooms • Dewey I / II • Charleston I / II • Farragut • wireless will be available Contact Staff
Thanks to NCAR Staff • Susan Cross • Lynda Lester • Janie Young
Cybersecurity Summit ? • Concept of Summit – Spring 2004 Share information, discuss impact upon users, systems, etc. Best Practices Procedures for future incidents (communication, etc.) • To include peer agencies • Endorsed/Sponsored by National Science Foundation • Expanded to broad community • Expanded to include peer agencies • Invitation Only !